List of questions
Related questions
Question 512 - 312-50v12 discussion
As a cybersecurity consultant for SafePath Corp, you have been tasked with implementing a system for secure email communication. The key requirement is to ensure both confidentiality and non-repudiation. While considering various encryption methods, you are inclined towards using a combination of symmetric and asymmetric cryptography. However, you are unsure which cryptographic technique would best serve the purpose. Which of the following options would you choose to meet these requirements?
A.
Use symmetric encryption with the AES algorithm.
B.
Use the Diffie-Hellman protocol for key exchange and encryption.
C.
Apply asymmetric encryption with RSA and use the public key for encryption.
D.
Apply asymmetric encryption with RSA and use the private key for signing.
Your answer:
0 comments
Sorted by
Leave a comment first